SlideShare a Scribd company logo
1 of 14
Download to read offline
Interagency Session
   NSPD-59 and Identity Management


Duane Blackburn
Office of Science and Technology Policy
Executive Office of the President

September 22, 2009


                                          Biometrics.gov
Interagency Session
                          NSPD-59

Duane Blackburn
Office of Science and Technology Policy
Executive Office of the President




                                          Biometrics.gov
Brief History Recap
► 9/11
► NSTC Subcommittee on Biometrics and IdM
   ► RDT&E Focus
   ► Expand to standards and privacy
   ► Address interoperability concerns
► NIP: Operational Issue
   ► Partnership with NSTC
   ► Strategic Framework for KSTs, approved by NSTC and
     NSC
► NSPD-59
   ► KSTs
   ► NSTs
Biometrics in Government Post 9/11: Advancing
  Science, Enhancing Operations                           Biometrics.gov
NSPD-59: Current Status

► Known and Suspected Terrorists (KSTs)
   ► OMB and agencies integrating Strategic Framework into
     budget plans
   ► Interim measures in place while full functionality is being
     developed
► National Security Threats (NSTs)
   ► Reviewed some categories of individuals that don’t quite
     rise to the level of terrorists to see how well the USG is
     identifying and screening for them.
   ► KST-style approach not appropriate
   ► Existing bi- (or multi-)agency approaches are working
     well
   ► Continued assessments planned

                                                                   Biometrics.gov
NSPD-59: FAQs

► How can biometrics community help?
   ► Standards; RDT&E
   ► “Biometrics PD” is a misnomer
► How has the administration change impacted PD
  activities?
   ► Key thrusts and personnel remain unchanged
   ► Consolidation of HSC and NSC has been beneficial
► Can the PD be considered a success?
   ► Pros: Raised stature of efforts with incoming
     appointees
   ► Cons: Development of PD took lots of time and effort
     that we are still trying to recover from; addition of
     concurrent NST thrust sapped resources
   ► Summation: Ask me in five years!                        Biometrics.gov
Interagency Session
               Identity Management

Duane Blackburn
Office of Science and Technology Policy
Executive Office of the President




                                          Biometrics.gov
Government-supported
                 Studies/Work
► President’s Identity Theft Task Force
   ► 2006-2007
► NSTC Task Force on Identity Management
   ► Jan-Jul 2008
   ► First Holistic Analysis
► NSTAC Identity Management Task Force
   ► Dec 2008 – May 2009
   ► External Advisory Committee
   ► Initial tasking: Secure Authentication via Internet
► OECD/WPISP
   ► Mar 2008 – June 2009
   ► “The Role of Digital Identity Management in the Internet
     Economy: A Primer for Policymakers”
► CIO Council’s ISIMC
   ► Established 2008
   ► Addressing USG Credentialing issues
► 60-day Cyber Security review
   ► Feb-May 2009                                               Biometrics.gov
Common Themes - Importance

► Identity Management is a critical, though often
  underappreciated, component of successful
  applications in a variety of sectors
► IdM can help remove barriers to collaboration and
  innovation by ensuring trust
► People/things have only one “true” identity, but
  several aliases with varying degrees of
  confidence in the linkages to the “true” identity.
   ► How to enable and manage these identities properly in
     a single application is difficult, but is even more difficult
     across interconnected systems
► IdM activities in one application impacts and
  relies upon others, though these impacts aren’t
  normally understood or accounted for                               Biometrics.gov
Common Themes – R&D

► Technology available now is good, but
  improvements are needed to improve
  capabilities, resiliency, privacy protection,
  convenience and security
► Research is needed on how to best combine
  different technologies
► Researcher access to useful data is an inhibitor
► Side to side comparisons of technology options is
  difficult/confusing and isn’t keeping pace with
  new products



                                                      Biometrics.gov
Common Themes - Standards

► Interoperability is difficult if the systems do not
  share definitions and data structures
   ► Increases the chance of errors, which would be
     propagated throughout the interconnected systems
► Market-based and consensus-supported
  standards most likely to be universally accepted
► The existence and use of universal standards (or
  lack thereof) is often viewed as an indicator of a
  market/technology’s maturity




                                                        Biometrics.gov
Common Themes - Privacy

► Improving IdM can actually enhance privacy
  protection over the status quo – if done properly
► Outreach is an important aspect of privacy policy
   ► Even if the privacy policy is correct, negative public
     perception will scuttle a program quickly
► Privacy isn’t just for lawyers
   ► Building protections directly into the technology will
     provide greater assurance that the protections are
     implemented thoroughly and consistently.
► A single IdM privacy breach creates enduring
  problems in multiple systems
► Privacy and security aren’t mutually exclusive

                                                              Biometrics.gov
Common Themes – Need for Governance

► Identity-based systems are inherently connected
  to one another. Overall governance is required to
  manage this properly rather than ad-hoc or not at
  all
► All levels of government have the responsibility to
  ensure the safety and wellbeing of its citizenry –
  and IdM has clear impacts on national security,
  the economy, cyberspace, and individual
  healthcare
► Government must provide leadership and work
  with all stakeholders to create favorable
  conditions for the development of IdM that
  benefits users
                                                        Biometrics.gov
Looking to the Future

► National dialogue
► Standards development
► Policy coordination
► Public/Private partnership




                                   Biometrics.gov
Duane Blackburn
dblackburn@ostp.eop.gov
      202-456-6068




                          Biometrics.gov

More Related Content

Viewers also liked

OpenSocial State of the Union 2010
OpenSocial State of the Union 2010OpenSocial State of the Union 2010
OpenSocial State of the Union 2010weitzelm
 
Blogger & Facebook for FoL
Blogger & Facebook for FoLBlogger & Facebook for FoL
Blogger & Facebook for FoLjulid
 
Basics of new twitter
Basics of new twitterBasics of new twitter
Basics of new twitterHeidi Allen
 
Networking & Networking Etiquette
Networking & Networking EtiquetteNetworking & Networking Etiquette
Networking & Networking EtiquetteJMULLINMBA
 
Soccer Clinic Planning
Soccer Clinic PlanningSoccer Clinic Planning
Soccer Clinic Planningandy biggin
 
Kash Account Creation
Kash Account CreationKash Account Creation
Kash Account CreationAbriva Kash
 
DiffCalcSecondPartialReview
DiffCalcSecondPartialReviewDiffCalcSecondPartialReview
DiffCalcSecondPartialReviewCarlos Vázquez
 
IB Computer Science Section 6.3 Loaders, linkers and library managers
IB Computer Science Section 6.3 Loaders, linkers and library managersIB Computer Science Section 6.3 Loaders, linkers and library managers
IB Computer Science Section 6.3 Loaders, linkers and library managersstjulians school
 
Trapper School Grad P P
Trapper  School  Grad  P PTrapper  School  Grad  P P
Trapper School Grad P Pnsbsd
 
Social Media SEO for Business
Social Media SEO for BusinessSocial Media SEO for Business
Social Media SEO for BusinessHeidi Allen
 
Проекти Української мережі Євроклубів
Проекти Української мережі ЄвроклубівПроекти Української мережі Євроклубів
Проекти Української мережі ЄвроклубівSergiy Shtukarin
 
SLA-NY @ METRO
SLA-NY @ METROSLA-NY @ METRO
SLA-NY @ METROLisa Chow
 
DiffCalculus: August 27, 2012
DiffCalculus: August 27, 2012DiffCalculus: August 27, 2012
DiffCalculus: August 27, 2012Carlos Vázquez
 
Resumen de la pag. 1 a la 32 "Todo es teoría"
Resumen de la pag. 1 a la 32  "Todo es teoría"Resumen de la pag. 1 a la 32  "Todo es teoría"
Resumen de la pag. 1 a la 32 "Todo es teoría"laura68
 
авиаперевозки Clients 2009
авиаперевозки Clients 2009авиаперевозки Clients 2009
авиаперевозки Clients 2009Pavel Red'ko
 
23205011
2320501123205011
23205011radgirl
 

Viewers also liked (19)

OpenSocial State of the Union 2010
OpenSocial State of the Union 2010OpenSocial State of the Union 2010
OpenSocial State of the Union 2010
 
Blogger & Facebook for FoL
Blogger & Facebook for FoLBlogger & Facebook for FoL
Blogger & Facebook for FoL
 
WIRA brochure 2010
WIRA brochure 2010WIRA brochure 2010
WIRA brochure 2010
 
Basics of new twitter
Basics of new twitterBasics of new twitter
Basics of new twitter
 
Networking & Networking Etiquette
Networking & Networking EtiquetteNetworking & Networking Etiquette
Networking & Networking Etiquette
 
Soccer Clinic Planning
Soccer Clinic PlanningSoccer Clinic Planning
Soccer Clinic Planning
 
Kash Account Creation
Kash Account CreationKash Account Creation
Kash Account Creation
 
DiffCalcSecondPartialReview
DiffCalcSecondPartialReviewDiffCalcSecondPartialReview
DiffCalcSecondPartialReview
 
IB Computer Science Section 6.3 Loaders, linkers and library managers
IB Computer Science Section 6.3 Loaders, linkers and library managersIB Computer Science Section 6.3 Loaders, linkers and library managers
IB Computer Science Section 6.3 Loaders, linkers and library managers
 
Trapper School Grad P P
Trapper  School  Grad  P PTrapper  School  Grad  P P
Trapper School Grad P P
 
NewStar NIMS Profile
NewStar NIMS ProfileNewStar NIMS Profile
NewStar NIMS Profile
 
Social Media SEO for Business
Social Media SEO for BusinessSocial Media SEO for Business
Social Media SEO for Business
 
Проекти Української мережі Євроклубів
Проекти Української мережі ЄвроклубівПроекти Української мережі Євроклубів
Проекти Української мережі Євроклубів
 
SLA-NY @ METRO
SLA-NY @ METROSLA-NY @ METRO
SLA-NY @ METRO
 
DiffCalculus: August 27, 2012
DiffCalculus: August 27, 2012DiffCalculus: August 27, 2012
DiffCalculus: August 27, 2012
 
Resumen de la pag. 1 a la 32 "Todo es teoría"
Resumen de la pag. 1 a la 32  "Todo es teoría"Resumen de la pag. 1 a la 32  "Todo es teoría"
Resumen de la pag. 1 a la 32 "Todo es teoría"
 
Dia De La Dona
Dia De La DonaDia De La Dona
Dia De La Dona
 
авиаперевозки Clients 2009
авиаперевозки Clients 2009авиаперевозки Clients 2009
авиаперевозки Clients 2009
 
23205011
2320501123205011
23205011
 

Similar to BCC 2009 - NSTC

NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryDuane Blackburn
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementDuane Blackburn
 
Women's Law Workgroup T2.economic t3.socialt4.safetyv2
Women's Law Workgroup T2.economic t3.socialt4.safetyv2Women's Law Workgroup T2.economic t3.socialt4.safetyv2
Women's Law Workgroup T2.economic t3.socialt4.safetyv2Lisa Marie Martinez
 
Gov health and safety session
Gov health and safety sessionGov health and safety session
Gov health and safety sessionalderso1
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublishedAlain Ducass
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureAnn Treacy
 
Advancing Identity Management (2007)
Advancing Identity Management (2007)Advancing Identity Management (2007)
Advancing Identity Management (2007)Duane Blackburn
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government NeedsDuane Blackburn
 
Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009edcervantes
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...M2SYS Technology
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics ChallengeDuane Blackburn
 

Similar to BCC 2009 - NSTC (20)

BCC 2007 - NSTC
BCC 2007 - NSTCBCC 2007 - NSTC
BCC 2007 - NSTC
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity Management
 
BiometricsMAIN13
BiometricsMAIN13BiometricsMAIN13
BiometricsMAIN13
 
Women's Law Workgroup T2.economic t3.socialt4.safetyv2
Women's Law Workgroup T2.economic t3.socialt4.safetyv2Women's Law Workgroup T2.economic t3.socialt4.safetyv2
Women's Law Workgroup T2.economic t3.socialt4.safetyv2
 
Gov health and safety session
Gov health and safety sessionGov health and safety session
Gov health and safety session
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished
 
Security Metrics [2008]
Security Metrics [2008]Security Metrics [2008]
Security Metrics [2008]
 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
 
Advancing Identity Management (2007)
Advancing Identity Management (2007)Advancing Identity Management (2007)
Advancing Identity Management (2007)
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government Needs
 
Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics Challenge
 

More from Duane Blackburn

What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-ApprovedDuane Blackburn
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesDuane Blackburn
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerDuane Blackburn
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Duane Blackburn
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)Duane Blackburn
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EDuane Blackburn
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Duane Blackburn
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...Duane Blackburn
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Duane Blackburn
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report Duane Blackburn
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Duane Blackburn
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual FoundationDuane Blackburn
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Duane Blackburn
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Duane Blackburn
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process OverviewDuane Blackburn
 
BCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics CooperativeBCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics CooperativeDuane Blackburn
 
BCC 2004 - Research Needs In Biometrics
BCC 2004 -  Research Needs In BiometricsBCC 2004 -  Research Needs In Biometrics
BCC 2004 - Research Needs In BiometricsDuane Blackburn
 

More from Duane Blackburn (20)

What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-Approved
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&E
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual Foundation
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process Overview
 
BCC 2008 - NSTC
BCC 2008 - NSTCBCC 2008 - NSTC
BCC 2008 - NSTC
 
BCC 2006 - NSTC
BCC 2006 - NSTCBCC 2006 - NSTC
BCC 2006 - NSTC
 
BCC 2005 - NSTC
BCC 2005 - NSTC BCC 2005 - NSTC
BCC 2005 - NSTC
 
BCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics CooperativeBCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics Cooperative
 
BCC 2004 - Research Needs In Biometrics
BCC 2004 -  Research Needs In BiometricsBCC 2004 -  Research Needs In Biometrics
BCC 2004 - Research Needs In Biometrics
 

BCC 2009 - NSTC

  • 1. Interagency Session NSPD-59 and Identity Management Duane Blackburn Office of Science and Technology Policy Executive Office of the President September 22, 2009 Biometrics.gov
  • 2. Interagency Session NSPD-59 Duane Blackburn Office of Science and Technology Policy Executive Office of the President Biometrics.gov
  • 3. Brief History Recap ► 9/11 ► NSTC Subcommittee on Biometrics and IdM ► RDT&E Focus ► Expand to standards and privacy ► Address interoperability concerns ► NIP: Operational Issue ► Partnership with NSTC ► Strategic Framework for KSTs, approved by NSTC and NSC ► NSPD-59 ► KSTs ► NSTs Biometrics in Government Post 9/11: Advancing Science, Enhancing Operations Biometrics.gov
  • 4. NSPD-59: Current Status ► Known and Suspected Terrorists (KSTs) ► OMB and agencies integrating Strategic Framework into budget plans ► Interim measures in place while full functionality is being developed ► National Security Threats (NSTs) ► Reviewed some categories of individuals that don’t quite rise to the level of terrorists to see how well the USG is identifying and screening for them. ► KST-style approach not appropriate ► Existing bi- (or multi-)agency approaches are working well ► Continued assessments planned Biometrics.gov
  • 5. NSPD-59: FAQs ► How can biometrics community help? ► Standards; RDT&E ► “Biometrics PD” is a misnomer ► How has the administration change impacted PD activities? ► Key thrusts and personnel remain unchanged ► Consolidation of HSC and NSC has been beneficial ► Can the PD be considered a success? ► Pros: Raised stature of efforts with incoming appointees ► Cons: Development of PD took lots of time and effort that we are still trying to recover from; addition of concurrent NST thrust sapped resources ► Summation: Ask me in five years! Biometrics.gov
  • 6. Interagency Session Identity Management Duane Blackburn Office of Science and Technology Policy Executive Office of the President Biometrics.gov
  • 7. Government-supported Studies/Work ► President’s Identity Theft Task Force ► 2006-2007 ► NSTC Task Force on Identity Management ► Jan-Jul 2008 ► First Holistic Analysis ► NSTAC Identity Management Task Force ► Dec 2008 – May 2009 ► External Advisory Committee ► Initial tasking: Secure Authentication via Internet ► OECD/WPISP ► Mar 2008 – June 2009 ► “The Role of Digital Identity Management in the Internet Economy: A Primer for Policymakers” ► CIO Council’s ISIMC ► Established 2008 ► Addressing USG Credentialing issues ► 60-day Cyber Security review ► Feb-May 2009 Biometrics.gov
  • 8. Common Themes - Importance ► Identity Management is a critical, though often underappreciated, component of successful applications in a variety of sectors ► IdM can help remove barriers to collaboration and innovation by ensuring trust ► People/things have only one “true” identity, but several aliases with varying degrees of confidence in the linkages to the “true” identity. ► How to enable and manage these identities properly in a single application is difficult, but is even more difficult across interconnected systems ► IdM activities in one application impacts and relies upon others, though these impacts aren’t normally understood or accounted for Biometrics.gov
  • 9. Common Themes – R&D ► Technology available now is good, but improvements are needed to improve capabilities, resiliency, privacy protection, convenience and security ► Research is needed on how to best combine different technologies ► Researcher access to useful data is an inhibitor ► Side to side comparisons of technology options is difficult/confusing and isn’t keeping pace with new products Biometrics.gov
  • 10. Common Themes - Standards ► Interoperability is difficult if the systems do not share definitions and data structures ► Increases the chance of errors, which would be propagated throughout the interconnected systems ► Market-based and consensus-supported standards most likely to be universally accepted ► The existence and use of universal standards (or lack thereof) is often viewed as an indicator of a market/technology’s maturity Biometrics.gov
  • 11. Common Themes - Privacy ► Improving IdM can actually enhance privacy protection over the status quo – if done properly ► Outreach is an important aspect of privacy policy ► Even if the privacy policy is correct, negative public perception will scuttle a program quickly ► Privacy isn’t just for lawyers ► Building protections directly into the technology will provide greater assurance that the protections are implemented thoroughly and consistently. ► A single IdM privacy breach creates enduring problems in multiple systems ► Privacy and security aren’t mutually exclusive Biometrics.gov
  • 12. Common Themes – Need for Governance ► Identity-based systems are inherently connected to one another. Overall governance is required to manage this properly rather than ad-hoc or not at all ► All levels of government have the responsibility to ensure the safety and wellbeing of its citizenry – and IdM has clear impacts on national security, the economy, cyberspace, and individual healthcare ► Government must provide leadership and work with all stakeholders to create favorable conditions for the development of IdM that benefits users Biometrics.gov
  • 13. Looking to the Future ► National dialogue ► Standards development ► Policy coordination ► Public/Private partnership Biometrics.gov
  • 14. Duane Blackburn dblackburn@ostp.eop.gov 202-456-6068 Biometrics.gov